Sciweavers

10792 search results - page 2109 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
DOCENG
2007
ACM
14 years 1 months ago
A document engineering environment for clinical guidelines
In this paper, we present a document engineering environment for Clinical Guidelines (G-DEE), which are standardized medical documents developed to improve the quality of medical ...
Gersende Georg, Marie-Christine Jaulent
COMPLEX
2009
Springer
14 years 1 months ago
Inter-Profile Similarity (IPS): A Method for Semantic Analysis of Online Social Networks
Online Social Networks (OSN) are experiencing an explosive growth rate and are becoming an increasingly important part of people's lives. There is an increasing desire to aid ...
Matt Spear, Xiaoming Lu, Norman S. Matloff, Shyhts...
EMSOFT
2007
Springer
14 years 1 months ago
A unified practical approach to stochastic DVS scheduling
This paper deals with energy-aware real-time system scheduling using dynamic voltage scaling (DVS) for energy-constrained embedded systems that execute variable and unpredictable ...
Ruibin Xu, Rami G. Melhem, Daniel Mossé
EENERGY
2010
14 years 1 months ago
Combustible gases and early fire detection: an autonomous system for wireless sensor networks
Fires or toxic gas leakages may have grave consequences like significant pecuniary loss or even lead to human victims. In this paper we present an autonomous wireless sensor syste...
Andrey Somov, D. Spirjakin, M. Ivanov, I. Khromush...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
« Prev « First page 2109 / 2159 Last » Next »